Sharmin Afrose

Orcid: 0000-0003-1835-773X

According to our database1, Sharmin Afrose authored at least 15 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks.
IEEE Trans. Software Eng., February, 2023

A QIR Toolchain with XACC.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2023

2022
Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding.
IEEE Secur. Priv., 2022

2021
Frequent Itemsets Mining with a Guaranteed Local Differential Privacy in Small Datasets.
Proceedings of the SSDBM 2021: 33rd International Conference on Scientific and Statistical Database Management, 2021

Measurement of Local Differential Privacy Techniques for IoT-based Streaming Data.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

2020
Tutorial: Principles and Practices of Secure Cryptographic Coding in Java.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020

Deployment-quality and Accessible Solutions for Cryptography Code Development.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

A Comprehensive Benchmark on Java Cryptographic API Misuses.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
Towards Privacy-preserving Authenticated Disease Risk Queries.
J. Inf. Process., 2019

CryptoAPI-Bench: A Comprehensive Benchmark on Java Cryptographic API Misuses.
Proceedings of the 2019 IEEE Cybersecurity Development, 2019

Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Poster: Semantic Clustering in Credible Human Sensed Event Detection.
Proceedings of the 14th International Conference on Distributed Computing in Sensor Systems, 2018

A Novel Secret Sharing Approach for Privacy-Preserving Authenticated Disease Risk Queries in Genomic Databases.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2013
Ecologies of use and design: individual and social practices of mobile phone use within low-literate rickshawpuller communities in urban Bangladesh.
Proceedings of the Annual Symposium on Computing for Development, 2013


  Loading...